Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Junko Takahashi, Toshinori Fukunaga, Kazumaro Aoki, Hitoshi Fuji |
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yang Yu, Zhanfei Zhou |
A Rational Secret Sharing Protocol with Unconditional Security in the Synchronous Setting. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Plantard, Willy Susilo, Zhenfei Zhang |
Adaptive Precision Floating Point LLL. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi |
Attribute-Based Identification: Definitions and Efficient Constructions. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yuliang Zheng 0001 |
Public Key Cryptography for Mobile Cloud. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hui Zhang, Tsuyoshi Takagi |
Attacks on Multi-Prime RSA with Small Prime Difference. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang 0001 |
Improved Boomerang Attacks on SM3. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya |
Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chris J. Mitchell |
Analysing the IOBC Authenticated Encryption Mode. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yao Lu 0002, Rui Zhang 0002, Dongdai Lin |
Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada, Katsumi Takahashi |
Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar 0001, Meltem Sönmez Turan |
A Chosen IV Related Key Attack on Grain-128a. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Takayasu, Noboru Kunihiro |
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jie Chen 0021, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen 0002 |
Revocable Identity-Based Encryption from Lattices. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona |
Private Fingerprint Matching. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu |
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga |
A Game-Theoretic Perspective on Oblivious Transfer. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy |
Effort-Release Public-Key Encryption from Cryptographic Puzzles. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler |
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe 0001 |
On the Optimality of Lattices for the Coppersmith Technique. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jun Shao 0001 |
Anonymous ID-Based Proxy Re-Encryption. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Wenpan Jing, Haixia Xu 0002, Bao Li 0001 |
Non-malleable Instance-Dependent Commitment in the Standard Model. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xuhua Zhou, Xuhua Ding, Kefei Chen |
A Generic Construction of Accountable Decryption and Its Applications. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Aijun Ge 0001, Rui Zhang 0002, Cheng Chen, Chuangui Ma, Zhenfeng Zhang |
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel 0001 |
Weimar-DM: A Highly Secure Double-Length Compression Function. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jiazhe Chen, Leibo Li |
Low Data Complexity Attack on Reduced Camellia-256. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jintai Ding, Yanbin Pan, Yingpu Deng |
An Algebraic Broadcast Attack against NTRU. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter Lory, Manuel Liedel |
Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Paul Stankovski, Martin Hell, Thomas Johansson 0001 |
Analysis of Xorrotation with Application to an HC-128 Variant. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | A. S. M. Kayes, Jun Han 0004, Alan W. Colman |
ICAF: A Context-Aware Framework for Access Control. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Haibo Tian, Xiaofeng Chen 0001, Jin Li 0002 |
A Short Non-delegatable Strong Designated Verifier Signature. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kaori Tosu, Noboru Kunihiro |
Optimal Bounds for Multi-Prime Φ-Hiding Assumption. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Matt Henricksen |
How to Fix Two RSA-Based PVSS Schemes - Exploration and Solution. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Isobe 0001, Kyoji Shibutani |
Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong |
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kirill Morozov, Tsuyoshi Takagi |
Zero-Knowledge Protocols for the McEliece Encryption. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mufeed Juma AlMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong |
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xianmeng Meng, Xuexin Zheng |
Cryptanalysis of RSA with a Small Parameter. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar |
Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan |
An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kaleb Lee, Colin Boyd, Juan Manuel González Nieto |
Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Axel Poschmann, Matthew J. B. Robshaw |
On Area, Time, and the Right Trade-Off. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Manh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga |
Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Yi Mu 0001, Jennifer Seberry (eds.) |
Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Tan 0003, Duncan S. Wong |
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tsz Hon Yuen, Siu-Ming Yiu, Lucas Chi Kwong Hui |
Fully Leakage-Resilient Signatures with Auxiliary Inputs. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuji Nagashima, Noboru Kunihiro |
Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Juan Manuel González Nieto, Mark Manulis, Dongdong Sun |
Fully Private Revocable Predicate Encryption. |
ACISP |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Phuong Ha Nguyen, Hongjun Wu 0001, Huaxiong Wang |
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu |
A Generic Variant of NIST's KAS2 Key Agreement Protocol. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Reza Sepahi, Ron Steinfeld, Josef Pieprzyk |
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster). |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Praveen Gauravaram, Lars R. Knudsen, Nasour Bagheri, Lei Wei 0001 |
Improved Security Analysis of Fugue-256 (Poster). |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Udaya Parampalli, Philip Hawkes (eds.) |
Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yusong Du, Fangguo Zhang |
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Meicheng Liu, Dongdai Lin, Dingyi Pei |
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hongying Liu, Yukiyasu Tsunoo, Satoshi Goto |
Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster). |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson |
State Convergence in the Initialisation of Stream Ciphers. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wei 0001, Christian Rechberger, Jian Guo 0001, Hongjun Wu 0001, Huaxiong Wang, San Ling |
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman |
Toward Dynamic Attribute-Based Signcryption (Poster). |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Claude Carlet |
On Known and New Differentially Uniform Functions. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christian L. F. Corniaux, Hossein Ghodosi |
A Verifiable Distributed Oblivious Transfer Protocol. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito |
Generic Construction of Strongly Secure Timed-Release Public-Key Encryption. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Juraj Sarinay |
Faster and Smoother - VSH Revisited. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jia Fan, Yuliang Zheng 0001, Xiaohu Tang |
A Single Key Pair is Adequate for the Zheng Signcryption. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama |
Preimage Attacks on Full-ARIRANG (Poster). |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng |
Impracticality of Efficient PVSS in Real Life Security Standard (Poster). |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yamin Liu, Bao Li 0001, Xianhui Lu, Dingding Jia |
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel, Hirotaka Yoshida, Dai Watanabe |
Finding Collisions for Reduced Luffa-256 v2 (Poster). |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin W. Long |
Security in Depth through Smart Space Cascades. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Craig S. Wright |
Compliance or Security, What Cost? (Poster). |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Cheng-Kang Chu, Jianying Zhou 0001 |
Identity-Based Server-Aided Decryption. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shashank Lagishetty, Pruthvi Reddy Sabbu, Kannan Srinathan |
DMIPS - Defensive Mechanism against IP Spoofing. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel |
Algebraic Techniques in Differential Cryptanalysis Revisited. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hongbo Yu, Xiaoyun Wang 0001 |
Cryptanalysis of the Compression Function of SIMD. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mingwu Zhang, Tsuyoshi Takagi |
GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes |
Application-Binding Protocol in the User Centric Smart Card Ownership Model. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Eduarda S. V. Freire 0001, Kenneth G. Paterson |
Provably Secure Key Assignment Schemes from Factoring. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang 0001 |
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Tang 0001 |
Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Bogdanov, Kyoji Shibutani |
Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri |
On Maximum Differential Probability of Generalized Feistel. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tetsuya Hatano, Atsuko Miyaji, Takashi Sato |
T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yun Zhang, Christophe Tartary, Huaxiong Wang |
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Electronic Cash with Anonymous User Suspension. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Barbosa, Pooya Farshim |
Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai |
Adaptive and Composable Non-committing Encryptions. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jean-François Biasse, Michael J. Jacobson Jr., Alan K. Silvester |
Security Estimates for Quadratic Field Based Cryptosystems. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth Koon-Ho Wong, Gregory V. Bard |
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Henricksen, Wun-She Yap, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka |
Side-Channel Analysis of the K2 Stream Cipher. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth G. Paterson, Douglas Stebila |
One-Time-Password-Authenticated Key Exchange. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka |
A Multi-trapdoor Commitment Scheme from the RSA Assumption. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Proof-of-Knowledge of Representation of Committed Value and Its Applications. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Phuong Ha Nguyen, Lei Wei 0001, Huaxiong Wang, San Ling |
On Multidimensional Linear Cryptanalysis. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li 0002, Kwangjo Kim |
Identity-Based Chameleon Hash Scheme without Key Exposure. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
Attribute-Based Authenticated Key Exchange. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Etrog, Matthew J. B. Robshaw |
On Unbiased Linear Approximations. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Margus Niitsoo |
Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christian Rechberger |
Second-Preimage Analysis of Reduced SHA-1. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | James Birkett, Douglas Stebila |
Predicate-Based Key Exchange. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|